Principleof LeastPrivilegeusers andprograms shouldonly have thenecessary accessto complete theirtasksIPAddressa series ofnumbers thatidentifies anydevice on anetworkreconnaissancepractice ofcovertlydiscovering andcollectinginformationabout a systemthreatanything thathas thepotential tocause the lossof an assetintegrityensures thatdata is notmodified ortamperedwithenumerationprocess ofextracting usernames, machinenames, networkresources, sharesand services from asystemthink likeanadversarystrategy thatallows you toanticipate attackstrategies anddefend yoursystemsaccordinglyexploita procedure orproduct that takesadvantage of avulnerability tocarry out a threat penetrationtestingattempt toevaluate thesecurity of an ITinfrastructure bysafely trying toexploitvulnerabilitieshactivistmisuse a computersystem or networkfor socially orpolitically motivatedreasonsassetsomethingthat hasvalue to theperson ororganizationconfidentialityensures thatdata is notdisclosed tounintendedpersonszerodayattack targeting asoftwarevulnerability whichis unknown to thesoftware vendor orto antivirus vendorsIoTnetwork ofphysical objectsembedded withsensors andsoftwareconnected to theInternetthreatagentperson orentity thatattempts orcarries out athreatLinuxopen source andcommunity-developed operatingsystem forcomputers, servers,mainframes, mobiledevices andembedded devicesavailabilityensures theuptime of thesystem so thatdata isaccessiblewhen neededscriptkiddieunsophisticatedthreat actorsthat find andrun attacks theyfind online MACAddressa hardwareidentificationnumber thatuniquely identifieseach device on anetworkdefenseindeptha security approachthat combinesmultiple securitycontrols anddefenses to create acumulative effectcybercriminalusually seek toexploit securityvulnerabilities forsome kind offinancial reward orrevengevulnerabilitya weakness that allowsa threat to be carriedout, such as a USBport that is enabled onthe server hosting thedatabase or a serverroom door that isfrequently left ajarnon-repudiationprovidesvalidation ofa message'soriginnation-stateextremelysophisticatedhacker that issponsored by oraffiliated with agovernmentalorganizationPrincipleof LeastPrivilegeusers andprograms shouldonly have thenecessary accessto complete theirtasksIPAddressa series ofnumbers thatidentifies anydevice on anetworkreconnaissancepractice ofcovertlydiscovering andcollectinginformationabout a systemthreatanything thathas thepotential tocause the lossof an assetintegrityensures thatdata is notmodified ortamperedwithenumerationprocess ofextracting usernames, machinenames, networkresources, sharesand services from asystemthink likeanadversarystrategy thatallows you toanticipate attackstrategies anddefend yoursystemsaccordinglyexploita procedure orproduct that takesadvantage of avulnerability tocarry out a threatpenetrationtestingattempt toevaluate thesecurity of an ITinfrastructure bysafely trying toexploitvulnerabilitieshactivistmisuse a computersystem or networkfor socially orpolitically motivatedreasonsassetsomethingthat hasvalue to theperson ororganizationconfidentialityensures thatdata is notdisclosed tounintendedpersonszerodayattack targeting asoftwarevulnerability whichis unknown to thesoftware vendor orto antivirus vendorsIoTnetwork ofphysical objectsembedded withsensors andsoftwareconnected to theInternetthreatagentperson orentity thatattempts orcarries out athreatLinuxopen source andcommunity-developed operatingsystem forcomputers, servers,mainframes, mobiledevices andembedded devicesavailabilityensures theuptime of thesystem so thatdata isaccessiblewhen neededscriptkiddieunsophisticatedthreat actorsthat find andrun attacks theyfind online MACAddressa hardwareidentificationnumber thatuniquely identifieseach device on anetworkdefenseindeptha security approachthat combinesmultiple securitycontrols anddefenses to create acumulative effectcybercriminalusually seek toexploit securityvulnerabilities forsome kind offinancial reward orrevengevulnerabilitya weakness that allowsa threat to be carriedout, such as a USBport that is enabled onthe server hosting thedatabase or a serverroom door that isfrequently left ajarnon-repudiationprovidesvalidation ofa message'soriginnation-stateextremelysophisticatedhacker that issponsored by oraffiliated with agovernmentalorganization

Cybersecurity Overview - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24